Available online at ScienceDirect. Procedia Engineering 78 (2014 )
|
|
- Leon Lawson
- 5 years ago
- Views:
Transcription
1 Available online at ScienceDirect Procedia Engineering 78 (2014 ) Humanitarian Technology: Science, Systems and Global Impact 2014, HumTech2014 Algorithm for source mobile identification and deactivation in SMS triggered improvised explosive devices Francis Enejo Idachaba* Covenant University Ota. Ogun State Nigeria Abstract Mobile communication technology can be used for the activation of explosive devices from more remote locations using the short messaging system. The platform eliminates the need for the detonator to be near the Improvised Explosive Devices. It eliminates the need for line of sight between the transmitter and the receiver and can also be used to activate multiple IEDs from one location with one message. This paper presents the development of an algorithm for the minimization or delayed activation of suspected SMS triggered explosive device. It will also enable the detection of GSM enabled IEDs before they are activated and the localization of the source mobile for the trigger SMS in real-time with a possibility of stopping the delivery of such suspected SMS trigger messages Elsevier The Authors. Ltd. This Published an open by Elsevier access article Ltd. under the CC BY-NC-ND license ( Selection and peer-review under responsibility of the Organizing Committee of HumTech2014. Selection and peer-review under responsibility of the Organizing Committee of HumTech2014 Keywords: Detonation; Explosive devices; Mobile Communication; Short Messaging System 1. Introduction Mobile communication technology provides a platform for communication between mobile devices located within the coverage area of the base station antennas. To maximize the available frequencies, the geographical area covered by the antenna is broken down into cells where the frequencies are reused depending on the communication technology and the population/ traffic density in those locations. Figure 1 shows the architecture of a mobile communication network. The mobile communication architecture provides a platform that can be utilized for the activation of multiple IEDs located in different geographical location from one source mobile located in another * Corresponding author. address: idachabafe@yahoo.com Elsevier Ltd. This is an open access article under the CC BY-NC-ND license ( Selection and peer-review under responsibility of the Organizing Committee of HumTech2014 doi: /j.proeng
2 Francis Enejo Idachaba / Procedia Engineering 78 ( 2014 ) location. These mobile devices can be located on different continents thus making the detection and tracking of the trigger/source mobile impossible. Nomenclature BTS Base Transceiver Station SMS Short Message Service HLR Home Location Register VLR Visitor Location Register 1.1. Mobile Communication Technology There are two dominant mobile communication technologies and they have evolved over the years into different generations. These technologies are the Global System of Mobile communication (GSM) and the Code Division Multiple Access (CDMA) systems. This paper focuses on the GSM technology due to it wide spread deployment. Fig. 1. GSM Mobile Communication Architecture The GSM architecture consists of a Base Transceiver Station (BTS) connected to a Mobile Switching Center through the Base Station Controller. The details of the mobile unit and the owner details are stored in the HLR and VLR databases while the Gateway MSC (GMSC) provides links to other operator networks.[1][2][3] 1.2. Short Messaging Service Short Messaging Service (SMS) is a very significant service delivered by mobile communication networks. It involves the transmission of alphanumeric characters (160 characters in length) from a source mobile to a receiving mobile. The SMS can be sent from one mobile to one receiving mobile or from one mobile to multiple receiving mobiles at the same time. The SMS is sent from the originating mobile and it goes through the operator network to the SMS center. An SMS center (SMSC) is responsible for handling the SMS operations of a wireless network. An SMS message may need to pass through more than one network entity (e.g. SMSC and SMS gateway) before reaching the destination. The main duty of an SMSC is to route SMS messages and regulate the process. If the recipient is unavailable or the phone is switched off, the SMSC will store the SMS message. The SMS will be forwarded to the recipient whenever it becomes available. SMSC are usually dedicated to handle the SMS traffic of one wireless network with each operator managing their own but it is possible for a network operator to use a third-
3 98 Francis Enejo Idachaba / Procedia Engineering 78 ( 2014 ) party SMSC that is located outside their wireless network system. The typical SMS network architecture in Figure 2 shows the SMS center and the different databases of the network. These databases are the Home Location Register (HLR) and the Visitor Location Register (VLR). The SMSC uses these data to locate the mobile unit and forwards the messages through the MSC and base station to the destination mobile SMS Message Delivery Process The SMS message delivery process is shown in Figure 3. Fig. 2. SMS Architecture Fig. 3. SMS delivery process 1. The MS transfers the SM to the MSC. 2. The MSC interrogates the home SMSC to verify that the message transfer does not violate the supplementary services invoked or the restrictions imposed. The MSC sends the short message to the home SMSC using the SMSPP Invoke operation 3. The SMSC delivers an acknowledgment to the MSC. 4. The MSC returns order release to the MS. 5. The SMSC queries the HLR for the location of the destination MS. 6. The HLR returns the destination (MSC) serving the destination MS. 7. The SMSC delivers SM to the MSC serving the destination MS. 8. The SMSC delivers the short message to the MS. 9. The MS acknowledges to the MSC the successful outcome of the SMSDPP operation. 10. The MSC returns to the SMSC the outcome of the MO-SM operation (delivery successful) 2. SMS based Control The combination of the GSM/ Mobile communication technology and the microcontrollers created a new field of remote control where control signals are sent over the communication network in the form of SMS messages. The control messages are received by the receiving mobile and sent to the microcontroller which decodes the messages and activates the relevant switches for controlling the devices[4][5][6][7][8]. A block diagram of this control network is shown in Figure 4. Communication Modem Microcontroller Relays and Switches Device Fig. 4. SMS based remote control architecture
4 Francis Enejo Idachaba / Procedia Engineering 78 (2014)
5 100 Francis Enejo Idachaba / Procedia Engineering 78 ( 2014 ) The algorithm also checks to see the frequency of the recipient mobile in that location. If it has been there before, then this condition compared with all the previous conditions have to be met before the messages are delivered but if it is not registered or if it doesn t have a history of delivered messaged or if it is its first time in that location, the message is delayed and analyzed. The Algorithm checks can be run on any mobile that enters any of the critical areas such that suspicious mobiles are tagged before any SMS is sent to them. Thus mobiles that can receive SMS will be known before the SMS comes and suspicious mobiles phones will not receive any SMS sent to them. This ensures that the Algorithm has no impact on message delivery time. The location of the tagged mobiles can be sent to security forces if the mobiles are found to be stationary beyond the normal operating time of the work area or before the commencement of a major activity within the critical area. It is mandatory in most countries for all mobile numbers to be registered with their operators as such SMS sent to any unregistered mobile phone/ number in the critical area will not be delivered 4.1. Flowchart The flowchart for the Source Mobile identification and attack prevention algorithm is shown in Figure 7. Incoming SMS Message Check SMS Destination mobile location Is Mobile in the critical area? Deliver SMS YES Is Mobile Registered? Investigate SMS Discard YES Deliver SMS YES Has Mobile got message or YES call or sent any in the last one hour before entering the critical area? Has Mobile Got message / call history? Has Mobile been stationary for > 8 hours? YES Delay delivery until mobile leave the critical area Deliver SMS Delay delivery until peak period of activity is past Fig. 7. Flowchart for the Algorithm 4.2. Algorithm for Source Mobile identification In the event of an SMS triggered explosion, the following algorithm can be used to narrow down and eventually identify the source of the trigger:
6 Francis Enejo Idachaba / Procedia Engineering 78 ( 2014 ) Isolate all the SMS received by mobiles in the area of the attack 2. Check all the sources of the SMS 3. Check the message history of all the recipient mobile numbers and isolate the mobile without prior receipt or transmitted messages 4. Identify the mobile number that doesn t come on after the attack, it is most likely the trigger module. 5. Identify the source mobiles that communicated with that sent the last SMS to the trigger mobile number and narrow the mobile down to the most frequent registered number on its call log. 6. If the source mobile is an unregistered mobile (and has been probably disposed) track the call logs of that mobile and the cell from where the cell was when the SMS was generated. Video camera feed of the area can be reviewed if they exist. 7. Check all the mobiles that communicated with the source mobile and create a record of the call frequency and duration. The registered mobile can be checked and the identified owners of those mobile can be handed over to the security agencies for further investigative action 5. Conclusion In the fight against terrorism, there is a constant need to be ahead of the perpetuators of these acts. This work provides an opportunity for governments to take preemptive steps against the period when the terrorists would begin to appreciate the opportunities provided by the use of the GSM platform for the transmission of IED trigger signals. These algorithms will require no change in the network configuration and will introduce minimal impact to the speed of message delivery. The algorithms also provide a means of identifying suspicious GSM modems and SMS trigger enabled IED before the messages are sent. The Early detection of the SMS enabled IEDs will result in a minimization of detonations while ensuring protection of both lives and critical infrastructure. References [1] Digital cellular telecommunications system (Phase 2+); Circuit switched voice capacity evolution for GSM/EDGE Radio Access Network (GERAN) (3GPP TR version Release 11) ETSI TR V ( ) ETSI [2] CDMA450 market facts. Dec 2013 [3] CDMA2000 Market Trends and facts. December 2013 [4] A.M Zungeru, U.V Edu and A.J Garba. Design and Implementation of Short Message Service based Remote Controller. Computer Engineering and Intelligent systems Vol3 No [5] B. Ramamurthy, S.Bhargavi, R. Shashikumar. Development of a low cost GSM SMS-based humidity Remote Monitoring and Control system for Industrial Application. International Journal of Advanced Computer Science and Application. Vol 1 No [6] A.J Al-Mghawish. A practical approach for mobile based remote control. European Scientific Journal June 2013 [7] M.Xu and J.Du. Design of SMS-based remote control system using TC35 and MCU. International Conference on Internet Computing and Information services Hong Kong 2011 [8] V.M Ibrahim, A.A Victor and S.Y Musa. GSM based Anti-theft Security system using AT&T Command. International Journal of Computational Engineering Research. Vol2 Issue [9] V.Covello, S.Becker, M.Palernchar, Q. Renn and P.Selke. Effective Risk Communication for the Counter Improvised Explosive Devices Threat. Vol 1 US Department of Home land Security Dec 2010 [10] Countering Improvised Explosive Devises. Office of the President of the United States of America Feb 2013 [11] Multi Jurisdiction IED Security Planning guide. US Department of Homeland Security. May 2008 [12] C.W Johnson. A systematic approach for countering the threat to public safety from Improvised Explosive Devices. [13] G.D Stevens. Whole of Government Approach to countering Domestic IEDs: Leveraging Military Capabilities. Institute for National Security and Counter Terrorism Syracuse University 2012 [14] K.Wilgucki, R.Urban, G. Baranowski, P.Gradzki, P.Skarzynski. Automated Protection Systems. Military Communications Institute Poland [15] C.Kopp. Defeating Improvised Explosive Devices. Defense Today Sept [16] Remotely Initiated IEDs: GSM Phones and Beyond. Scoping paper. Survey of RCIEDs South East Asia. Feb 2003-Oct OSS.net
Basics of GSM in depth
This document will be helpful for the telecom engineers who deal with GSM as well as for the fresher /interested readers. This document has some advantages over other GSM texts in that it quickly gets
More informationCellular Communication
Cellular Communication Cellular Communication Cellular communication is designed to provide communications between two moving units, or between one mobile unit and one stationary phone or land unit (PSTN).
More informationVEHICLE THEFT DETECTION BY GSM D.Gurunath 1, Dr. Sreeja Mole S S 2, Rekha 3 1
VEHICLE THEFT DETECTION BY GSM D.Gurunath 1, Dr. Sreeja Mole S S 2, Rekha 3 1 Assistant Professor, CJITS, Janangon 2 Professor/HOD, Department of ECE, CJITS, Janagon. 3 CJITS, Janagon Abstract Nowadays,
More informationShort Message Service (SMS)
TECQUI Ayra M.-B. Short Message Service (SMS) Introduction Short message service is a mechanism of delivery of short messages over the mobile networks. It is a store and forward way of transmitting messages
More informationE2-E3: CONSUMER MOBILITY. CHAPTER-5 CDMA x OVERVIEW (Date of Creation: )
E2-E3: CONSUMER MOBILITY CHAPTER-5 CDMA 2000 1x OVERVIEW (Date of Creation: 01-04.2011) Page: 1 CDMA 2000 1X Overview Introduction CDMA (code division multiple access) is a mobile digital radio technology
More informationInsights Into the SMS Industry and Market Trends
Insights Into the SMS Industry and Market Trends Stewart A. Skomra Director Business Development Qualcomm Enterprise Services E-Mail: sskomra@qualcomm.com Mobile: 858-740-4643 February 29, 2008 Wireless
More informationUnderstanding Carrier Wireless Systems
Understanding Course Description This course provides a detailed scope of modern mobile and cellular network technologies used for second generation, 2G+, 3G and 4G networks. It provides an understanding
More informationEUROPEAN ETS TELECOMMUNICATION November 1996 STANDARD
EUROPEAN ETS 300 522 TELECOMMUNICATION November 1996 STANDARD Third Edition Source: ETSI TC-SMG Reference: RE/SMG-030302PR2 ICS: 33.020 Key words: Digital cellular telecommunications system, Global System
More informationGPRS and UMTS T
GPRS and UMTS T-110.2100 Global Packet Radio Service GPRS uses the time slots not used for circuit switched services Data rate depends on the availability of free time slots GPRS uses the multislot technique,
More informationChapter 2 The 3G Mobile Communications
Chapter 2 The 3G Mobile Communications 2.1 The Vision for Third Generation (3G) Mobile Communication Systems: The vision for the emerging mobile and personal communication services for the new century
More informationITU-T Q Signalling architecture and requirements for IP-based short message service over ITU-T defined NGN
I n t e r n a t i o n a l T e l e c o m m u n i c a t i o n U n i o n ITU-T Q.3053 TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU (03/2017) SERIES Q: SWITCHING AND SIGNALLING, AND ASSOCIATED MEASUREMENTS
More informationAdvanced Computer Networks Exercise Session 4. Qin Yin Spring Semester 2013
Advanced Computer Networks 263-3501-00 Exercise Session 4 Qin Yin Spring Semester 2013 1 Administration If you haven't received any email about your submission We got your solutions for A1 & A2 About solutions
More informationETSI TS V6.1.0 ( )
TS 100 533 V6.1.0 (1999-07) Technical Specification Digital cellular telecommunications system (Phase 2+); Technical realization of Operator Determined Barring (ODB) (GSM 03.15 version 6.1.0 Release 1997)
More informationProcedia Computer Science
Procedia Computer Science 3 (2011) 949 953 Procedia Computer Science 00 (2010) 000 000 Procedia Computer Science www.elsevier.com/locate/procedia www.elsevier.com/locate/procedia WCIT 2010 An Implementation
More informationMobile forensics. SMS (Short Message Service) EMS, MMS, CBS
Mobile forensics SMS (Short Message Service) EMS, MMS, CBS How the Mobiles Work The Route of a Mobile Phone Telephone Call, (or SMS or user data traffic) SIM card Radio access network Core network MS/UE
More informationRab Nawaz Jadoon. Cellular Systems - II DCS. Assistant Professor. Department of Computer Science. COMSATS Institute of Information Technology
Cellular Systems - II Rab Nawaz Jadoon DCS Assistant Professor COMSATS IIT, Abbottabad Pakistan COMSATS Institute of Information Technology Mobile Communication UMTS Architecture A UMTS network consist
More informationJP-3GA (R99) Technical realisation of Operator Determined Barring (ODB)
JP-3GA-23.015(R99) Technical realisation of Operator Determined Barring (ODB) Version 1 Mar 31, 2000 THE TELECOMMUNICATION TECHNOLOGY COMMITTEE JP-3GA-23.015(R99) Technical realization of Operator Determined
More informationPertemuan 7 GSM Network. DAHLAN ABDULLAH
Pertemuan 7 GSM Network DAHLAN ABDULLAH Email : dahlan.unimal@gmail.com Contents GSM-Introduction Architecture Technical Specification & Operation Frame Structure Channels Call Routing Security Characteristics
More informationSignaling System 7 (SS7) By : Ali Mustafa
Signaling System 7 (SS7) By : Ali Mustafa Contents Types of Signaling SS7 Signaling SS7 Protocol Architecture SS7 Network Architecture Basic Call Setup SS7 Applications SS7/IP Inter-working VoIP Network
More informationNexus8610 Traffic Simulation System. Intersystem Handover Simulation. White Paper
Traffic Simulation System Intersystem Handover Simulation White Paper Notice Every effort has been made to ensure that the information in this document was accurate at the time of printing. However, the
More informationA Methodology in Mobile Networks for Global Roaming
ORIENTAL JOURNAL OF COMPUTER SCIENCE & TECHNOLOGY An International Open Free Access, Peer Reviewed Research Journal Published By: Oriental Scientific Publishing Co., India. www.computerscijournal.org ISSN:
More informationMethod and Device to Communicate via SMS After a Security Intrusion
Abstract Method and Device to Communicate via SMS After a Security Intrusion Vishy Karri 1, Daniel J.S. Lim 2 School of Engineering, University of Tasmania Hobart, Australia Vishy.Karri@utas.edu.au & jsdlim@utas.edu.au
More informationPersonal Handyphone Systems in Urban Infrastructure
Personal Handyphone Systems in Urban Infrastructure Yukio Iino Mitsunobu Ootsuka Isao Shimbo ABSTRACT: The personal handyphone system (PHS) service began in Japan in 1995. As this new communication service
More informationAlcatel-Lucent 1357 ULIS
Unified Lawful Interception Suite The adds lawful interception functions to Alcatel-Lucent products, adapting their internal interfaces to the standard lawful interception interfaces of law enforcement
More informationInternational Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 ISSN
7 Location Management Strategies in Mobile Networks Vivek Kumar Department of Computer Science & Engineering Graphic Era University, Dehradun, INDIA vivekror7@gmail.com Narayan Chaturvedi Department of
More informationAddressing Current and Future Wireless Demand
Addressing Current and Future Wireless Demand Dave Wolter Executive Director Radio Technology AT&T Architecture and Planning Rising Demand and The Need to Innovate in the Network 6,732% growth over 13
More informationTECHNICAL BRIEFING: MOBILE ACCESS TO THE INTERNET. Bornholm, October 2003
Electronic Communications Committee (ECC) within the European Conference of Postal and Telecommunications Administrations (CEPT) TECHNICAL BRIEFING: MOBILE ACCESS TO THE INTERNET Bornholm, October 2003
More informationINDUSTRY GROUP. GSM-R Core Evolution. Jean-Michel Evanghelou Head of Railways Solutions Kapsch CarrierCom. 1
GSM-R Core Evolution Jean-Michel Evanghelou Head of Railways Solutions Kapsch CarrierCom 1 Strategy Trend : Evolve GSM-R from TDM to IP Fully Secured Networks R99 to R4 evolution : Packetization of Voice
More informationMobile Security / /
Mobile Security 96-835 / 18-639 / 14-829 Patrick Tague 14 Sept 2010 Class #7 Securing Cellular Services Agenda Vulnerabilities in Cellular Services SMS and related attacks Cellular data services and attacks
More informationTelecommunication Services Engineering Lab
Logistics Instructor Office: EV006-227, Tel: 1-514-8482424 ext 5846, Email: Glitho@ciiseconcordiaca URL: http://wwwececoncordiaca/~glitho/ Office hours: Friday: 3 pm 5 pm Time: Friday, 17h45-20h15 Room
More informationTalk 4: WLAN-GPRS Integration for Next-Generation Mobile Data Networks
Talk 4: WLAN-GPRS Integration for Next-Generation Mobile Data Networks IEEE Wireless Communication, Oct. 2002 Presented by Prof. Yuh-Shyan Chen Department of Computer Science and Information Engineering
More informationInternational Journal of Scientific & Engineering Research, Volume 5, Issue 10, October ISSN
International Journal of Scientific & Engineering Research, Volume 5, Issue 10, October-2014 535 MINIMIZATION OF CALL DROP IN CODE DIVISION MULTIPLE ACCESS 2000IX IN 3G WIRELESS NETWORKS Udeh I.J, Offia
More informationWireless Communication
Wireless Communication Hwajung Lee Key Reference: Prof. Jong-Moon Chung s Lecture Notes at Yonsei University Wireless Communications Bluetooth Wi-Fi Mobile Communications LTE LTE-Advanced Mobile Communications
More informationAvoidance of Bottleneck in PCS Network
Avoidance of Bottleneck in PCS Network Sidhi Pandey 1, Alka 2, Pratima Singh 3 1, 2, 3 (Computer Science & Engineering, Institute of Technology & Management, India) Abstract: This paper contains the concept
More informationWIRELESS SYSTEM AND NETWORKING
LECTURE 6 WIRELESS SYSTEM AND NETWORKING References: Rappaport (Chapter 9 and 10) Bernhard (Chapter 3, 4 and 5) Garg (Chapter 8 and 9) Kaarenen (Chapter 1-5 and 9) WIRELESS EVOLUTION Japan Europe Americas
More informationTechnical description of international mobile roaming May 2010
Technical description of international mobile roaming May 2010 Prepared by the Ministry of Economic Development of New Zealand and the Department of Broadband, Communications and the Digital Economy of
More informationKapsch CarrierCom. Challenging limits
Kapsch CarrierCom Challenging limits The Kapsch Group Challenging Limits globally Four independently operating key entities: Kapsch TrafficCom Kapsch CarrierCom Kapsch BusinessCom Kapsch PublicTransportCom
More informationChapter 3 GSM and Similar Architectures
CSF645 Mobile Computing 行動計算 Chapter 3 GSM and Similar Architectures 吳俊興 國立高雄大學資訊工程學系 Chapter 3 GSM and Similar Architectures 3.1 GSM Services and System Architecture 3.2 Radio Interfaces 3.3 Protocols
More information10 Call Set-up. Objectives After this chapter the student will: be able to describe the activities in the network during a call set-up.
10 Call Set-up Objectives After this chapter the student will: be able to describe the activities in the network during a call set-up. 10.1 INTRODUCTION... 2 10.2 CALL TO MS (MT)... 3 10.3 CALL FROM MS
More informationMNPTF PT2. NPM2V1F 17 july Mobile Number Portability Task Force : PT2 : Network Architecture and Signalling
NPM2V1F 17 july 2001 Mobile Number Portability Task Force : PT2 : Network Architecture and Signalling HISTORY Date Version Evolution 27/02/2001 V11 Creation of draft version 16/03/2001 V20 Update of draft
More informationPublication of specifications for the mobile network interfaces offered by Wind
interfaces offered by Wind Page 1/10 Publication of specifications for the mobile network interfaces offered by Wind interfaces offered by Wind Page 2/10 TABLE OF CONTENTS 1. INTRODUCTION 3 2. SCOPE...
More informationThe challenges, opportunities and setting the framework for 5G EMF and Health
The challenges, opportunities and setting the framework for 5G EMF and Health 5G, EMF & Health 5 December 2017, Warsaw, Poland Mike Wood - General Manager Telstra EME Strategy, Governance and Risk Management
More informationGSM System Overview. Ph.D. Phone Lin.
GSM System Overview Phone Lin Ph.D. Email: plin@csie.ntu.edu.tw 1 Outlines Introduction GSM Architecture Location Tracking and Call Setup Security GSM Data Services Unstructured Supplementary Service Data
More information4G Mobile Communications
4G Mobile Communications Welcome to 4G The term 4G is used broadly to include several types of broadband wireless access communication systems, not only cellular telephone systems. One of the terms to
More informationETSI TR V1.1.1 ( )
TR 102 314-3 V1.1.1 (2005-03) Technical Report Fixed network Multimedia Messaging Service (F-MMS); PSTN/ISDN; Part 3: Network architecture and interconnection 2 TR 102 314-3 V1.1.1 (2005-03) Reference
More informationDimensioning, configuration and deployment of Radio Access Networks. part 1: General considerations. Mobile Telephony Networks
Dimensioning, configuration and deployment of Radio Access Networks. part 1: General considerations Mobile Telephony Networks 1 The Evolution of Mobile Telephony 1st Generation 2nd 3rd 4th Analogue Voice
More informationHands-On Modern Mobile and Long Term Evolution LTE
Hands-On LTE Course Description With 3G mobile technologies already rolled out by over 200 operators in over 80 countries, standards bodies, manufacturers and operators are looking towards the next generation
More informationTelecommunication Services Engineering Lab
Logistics Instructor Office: EV007-647, Tel: 1-514-8482424 ext 5846, Email: Glitho@ciiseconcordiaca URL: http://wwwececoncordiaca/~glitho/ Office hours: Tuesday: 3 pm 5 pm Time: Usually: Tuesday, 17h45-20h15
More informationE1-E2 UPGRADATION COURSE CONSUMER MOBILITY. 3G Concept
E1-E2 UPGRADATION COURSE CONSUMER MOBILITY 3G Concept Page 1 CHAPTER-TWO 3 G CONCEPT UMTS and the information society Rapid advancements in Information and Communications Technology (ICT) have already
More informationMedia Access Delay and Throughput Analysis of Voice Codec with Silence Suppression on Wireless Ad hoc Network
Available online at www.sciencedirect.com ScienceDirect Procedia Computer Science 79 (2016 ) 940 947 7th International Conference on Communication, Computing and Virtualization 2016 Media Access Delay
More informationAvailable online at ScienceDirect. Procedia Computer Science 57 (2015 )
Available online at www.sciencedirect.com ScienceDirect Procedia Computer Science 57 (2015 ) 890 897 2015 International Conference on Recent Trends in Computing (ICRTC 2015) Performance Analysis of Efficient
More informationCONNECTIVITY THROUGH BACKHAUL
Supported by www.gscoalition.org CONNECTIVITY THROUGH BACKHAUL The Critical Role of Satellite Services in Supporting Mobile Connectivity Through Backhaul. The importance of mobile connectivity cannot be
More informationCONNECTIVITY THROUGH BACKHAUL
The Critical Role of Satellite Services in Supporting Mobile Connectivity Through Backhaul. The importance of mobile connectivity cannot be overstated in today s world, whether for the most developed economies
More informationETSI TS V4.5.0 ( )
TS 122 078 V4.5.0 (2002-03) Technical Specification Digital cellular telecommunications system (Phase 2+) (GSM); Universal Mobile Telecommunications System (UMTS); Customized Applications for Mobile network
More informationInformation Technology Mobile Computing Module: GSM Handovers
Information Technology Mobile Computing Module: GSM Handovers Learning Objectives What is handover? Why handover are required? Types of handovers(hard and Soft) Types of Handovers in GSM(Intra cell, Inter
More informationVoice over Long Term Evolution Migration Strategies
White Paper Voice over Long Term Evolution Migration Strategies What You Will Learn The evolution of mobile networks to the Voice over Long Term Evolution (VoLTE) all-ip technology standard has generated
More informationMobile Security Fall 2013
Mobile Security 14-829 Fall 2013 Patrick Tague Class #4 Telecom System Security General Vulnerabilities Service interruption vulnerabilities Due to increased capacity offered by high speed communication
More informationE3-E4 (CM MODULE) CDMA x & EV-DO. For internal circulation of BSNL only
E3-E4 (CM MODULE) CDMA 2000 1x & EV-DO WELCOME This is a presentation for the E3-E4 Technical (CM- Module)fortheTopic:CDMA20001x&EV-DO Eligibility: Those who have got the upgradation frome3toe4. This presentation
More informationCellular Mobile Systems and Services (TCOM1010) GSM Architecture
GSM Architecture 1 GSM NETWORK INFRASTRUCTURE...2 2 NETWORK SWITCHING SUBSYSTEM (NSS)...3 2.1 Home Location Register...4 2.2 Mobile Switching Center and Visitor Location Register...4 2.3 Authentication
More informationETSI TS V1.1.1 ( )
TS 103 418 V1.1.1 (2017-02) TECHNICAL SPECIFICATION Railway Telecommunications (RT); SMS to Railway numbering plan in roaming environment 2 TS 103 418 V1.1.1 (2017-02) Reference DTS/RT-0042 Keywords GSM-R,
More informationINTERNET BASED FLEET MANAGEMENT USING GPS AND GSM/GPRS
INTERNET BASED FLEET MANAGEMENT USING GPS AND GSM/GPRS Item Type text; Proceedings Authors Cangzhou, Yuan; Qishan, Zhang; Zhongkan, Liu Publisher International Foundation for Telemetering Journal International
More informationInternal. GSM Fundamentals.
Internal GSM Fundamentals www.huawei.com HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Chapter 1 GSM System Overview Chapter 2 GSM Network Structure Chapter 3 Service Area and Number Planning Chapter
More informationScienceDirect. Advanced Object Monitoring Using Wireless Sensors Network
Available online at www.sciencedirect.com ScienceDirect Procedia Computer Science 65 (2015 ) 17 24 International Conference on Communication, Management and Information Technology (ICCMIT 2015) Advanced
More informationText Insertion in Short Message Delivery Report for CDMA Network
Vol. 5/No. 2 B (2013) INTERNETWORKING INDONESIA JOURNAL 15 in Short Message Report for CDMA Network Rakhman Imansyah, Andri Qiantori and Wiseto Agung Research and Development Center, TELKOM Bandung, Indonesia
More informationChapter 2. Literature Survey. 2.1 Remote access technologies
Chapter 2 Literature Survey This chapter presents a brief report on literature reviewed in context to present work with an aim to identify current state of research in the domain. Literature review is
More informationAdvanced Intelligent Network for Wireless Communications
www..org Advanced Intelligent Network for Wireless Communications 6 Pooja Sharma 1 Pawan Bhadana 2 1 B.S.Anangpuria Institute of Technology and Management, Faridabad, Haryana, India Poojasharma161@gmail.com
More informationOptimising 3G Migration
Optimising 3G Migration Sub-Regional Seminar on IMT-2000 Warsow,, 2-42 4 October 2001 Marie FROMENT Marketing Manager Alcatel Mobile Network Division marie.froment@alcatel.fr Optimising 3G Migration Outline
More informationWireless Communication
Wireless Communication Hwajung Lee Key Reference: Prof. Jong-Moon Chung s Lecture Notes at Yonsei University Wireless Communications Bluetooth Wi-Fi Mobile Communications LTE LTE-Advanced Mobile Communications
More informationSCADA Systems Management based on WEB Services
Available online at www.sciencedirect.com ScienceDirect Procedia Economics and Finance 32 ( 2015 ) 464 470 Emerging Markets Queries in Finance and Business SCADA Systems Management based on WEB Services
More informationSignaling Protocol Encoding and Simulation for Third Generation CDMA Network Air-Interface
16 th International Conference on AEROSPACE SCIENCES & AVIATION TECHNOLOGY, ASAT - 16 May 26-28, 2015, E-Mail: asat@mtc.edu.eg Military Technical College, Kobry Elkobbah, Cairo, Egypt Tel : +(202) 24025292
More informationMobile Networks Evolution: Economic Aspects of Evolution towards IMT2000
Mobile Networks Evolution: Economic Aspects of Evolution towards IMT2000 ITU-BDT Regional Seminar on Fixed Mobile Convergence and new network architecture for Arab Region Tunis, Tunisia, 21-24 November
More informationWireless Security Background
Wireless Security Background Wireless Networks The need for mobile computing Laptops, PDAs, Bluetooth devices Smart phones Enabling technology Wireless communication Two important characteristics Wireless
More informationMobile and Sensor Systems
Mobile and Sensor Systems Lecture 2: Mobile Medium Access Control Protocols and Wireless Systems Dr Cecilia Mascolo In this lecture We will describe medium access control protocols and wireless systems
More informationUnited States Patent (19) Boltz et al.
United States Patent (19) Boltz et al. 54 SYSTEM AND METHOD FOR TIME DEFINED DELIVERY OF SHORT MESSAGE SERVICE MESSAGES 75 Inventors: David Boltz; David B. Westbrook, both of Garland, TeX. 73 Assignee:
More informationMobile Security / /
Mobile Security 96-835 / 18-639 / 14-829 Patrick Tague 2 Sept 2010 Class #4 Overview of Mobile/Cellular Systems Agenda Overview of mobile cellular systems System architecture and overview 2G, 2.5G, 2.75G,
More information2009/TEL39/DSG-LSG/WKSP/010rev2 Affordable Universal Access to Broadband Using the Mainstream Mobile Technologies
2009/TEL39/DSG-LSG/WKSP/010rev2 Affordable Universal Access to Broadband Using the Mainstream Mobile Technologies Submitted by: Ericsson Workshop on Universal Access to Broadband Services Singapore 13
More informationChapter 7. Telecommunications, the Internet, and Wireless Technology
Chapter 7 Telecommunications, the Internet, and Wireless Technology LEARNING OBJECTIVES What are the principal components of telecommunications networks and key networking technologies? What are the different
More informationExperimental Analysis of the Femtocell Location Verification Techniques
Experimental Analysis of the Femtocell Location Verification Techniques Ravishankar Borgaonkar, Kevin Redon and Jean-Pierre Seifert Security in Telecommunication Technical University Berlin and Deutsche
More informationUMUDIKE JOURNAL OF ENGINEERING AND TECHNOLOGY (UJET) VOL. 1, NO. 2, DECEMBER 2015 PAGE 61-66
UMUDIKE JOURNAL OF ENGINEERING AND TECHNOLOGY (UJET) VOL. 1, NO. 2, DECEMBER 2015 PAGE 61-66 PERFORMANCE EVALUATION OF QUALITY OF SERVICE OF CDMA20001X MOBILE RADIO NETWORK *Ifeagwu, E N., Obi, P.I. and
More informationCommunication Systems for the Mobile Information Society
Communication Systems for the Mobile Information Society Martin Sauter Nortel Networks, Germany John Wiley Si Sons, Ltd Contents Preface List of Figures List of Tables List of Abbreviations xi xiii xix
More informationDesign of Intel 8751 Microcontroller-based System for Monitoring and Control of a Thermal Process
Design of Intel 8751 Microcontroller-based System for Monitoring and Control of a Thermal Process Francis Enejo Idachaba Department of Electrical and Information Engineering, College of Science and Technology,
More information28 Deploying IN Services in a Mobile Environment
28 Deploying IN Services in a Mobile Environment D. Haran Comverse Network Systems 170 Crossways Park Drive, Woodbury, New York 11797 USA Tel: (516) 677-7200, Fax: (516) 677-7355 E-mail danny_haran@comverse.com
More informationPCS (GSM) 1900 Service Provider Number Portability
ETSI SMG Plenary Tdoc SMG 661 / 97 Budapest, 13-17 October 1997 Agenda Item: 7.1 Source: SMG1 R GLOBAL SYSTEM FOR MOBILE COMMUNICATIONS PCS (GSM) 1900 Service Provider Number Portability ANSI This specification
More informationConvergent Offers and NGN
Convergent Offers and NGN BAKOM/OFCOM Workshop 5 th September 2006 1 Network convergence and customer expectations What is convergence? Mobile and fixed networks get together This development is coming
More informationStandardization Trend for Super 3G (LTE)
: NGN Mobile Communication Technologies for Standardization Trend for Super (LTE) Sadayuki Abeta and Minami Ishii Abstract Super (also known as Long Term Evolution (LTE)) expands upon the HSDPA/HSUPA (high-speed
More informationETSI ETR 109 TECHNICAL October 1993 REPORT
ETSI ETR 109 TECHNICAL October 1993 REPORT Source: ETSI TC-SMG Reference: GSM 09.01 ICS: 33.060.30 Key words: European digital cellular telecommunications system, Global System for Mobile communications
More informationCOPYRIGHTED MATERIAL. Introduction. Harri Holma and Antti Toskala. 1.1 WCDMA technology and deployment status
1 Introduction Harri Holma and Antti Toskala 1.1 WCDMA technology and deployment status The first Third Generation Partnership Project (3GPP) Wideband Code Division Multiple Access (WCDMA) networks were
More informationWireless and Mobile Network Architecture
Wireless and Mobile Network Architecture Chapter 8: GSM Mobility Management Prof. Yuh-Shyan Chen Department of Computer Science and Information Engineering National Taipei University Nov. 2006 1 Outline
More informationPERSONAL communications service (PCS) provides
646 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 5, NO. 5, OCTOBER 1997 Dynamic Hierarchical Database Architecture for Location Management in PCS Networks Joseph S. M. Ho, Member, IEEE, and Ian F. Akyildiz,
More informationTrends in Lawful Interception and Its Applications in National Security
Vol.1 No. 2, 95-99 (2012) Received Aug.2012; Accepted Nov.2012 Trends in Lawful Interception and Its Applications in National Security Abstract Namita Saxena and Mansi Singh Electronics and Communication
More informationDr. Evaldas Stankevičius, Regulatory and Security Expert.
2018-08-23 Dr. Evaldas Stankevičius, Regulatory and Security Expert Email: evaldas.stankevicius@tele2.com 1G: purely analog system. 2G: voice and SMS. 3G: packet switching communication. 4G: enhanced mobile
More informationGOPALAN COLLEGE OF ENGINEERING AND MANAGEMENT Electronics and communication Department
Appendix - F GOPALAN COLLEGE OF ENGINEERING AND MANAGEMENT Electronics and communication Department Academic Year: 2016-17 Semester: EVEN 6. COURSE PLAN Semester: VI Subject Code: 10EC81 Name of Subject:
More informationA Centralized Approaches for Location Management in Personal Communication Services Networks
A Centralized Approaches for Location Management in Personal Communication Services Networks Fahamida Firoze M. Tech. (CSE) Scholar, Deptt. Of CSE, Al Falah School of Engineering & Technology, Dhauj, Faridabad,
More informationAvailable online at ScienceDirect. Procedia Computer Science 34 (2014 )
Available online at www.sciencedirect.com ScienceDirect Procedia Computer Science 34 (2014 ) 680 685 International Workshop on Software Defined Networks for a New Generation of Applications and Services
More informationGSM and Mobile Telephony Trends
Review Article AJTL 2018,1:4 American Journal of Transportation and Logistics (DOI:10.28933/AJTL) GSM and Mobile Telephony Trends Damilola Fowora*, Oludele Awodele, Olakunle Olayinka and Oyebode Aduragbemi
More informationA NEW ALGORITHM FOR CALL SETUP FROM A FIXED WIRELINE TO A ROAMING MOBILE STATION IN AN ADJACENT NETWORK
International Journal of Computer Science and Communication Vol. 2, No. 1, January-June 2011, pp. 63 67 A NEW ALGORITHM FOR CALL SETUP FROM A FIXED WIRELINE TO A ROAMING MOBILE STATION IN AN ADJACENT NETWORK
More informationMobile Security Fall 2012
Mobile Security 14-829 Fall 2012 Patrick Tague Class #5 Telecom Infrastructure Attacks Announcements Project teams and topics need to be set soon Project topics must be approved before the proposal can
More informationTechnical Conference on Critical Infrastructure Protection Supply Chain Risk Management
Technical Conference on Critical Infrastructure Protection Supply Chain Risk Management Remarks of Marcus Sachs, Senior Vice President and the Chief Security Officer North American Electric Reliability
More informationGSM GSM TECHNICAL November 1996 SPECIFICATION Version 5.1.0
GSM GSM 02.78 TECHNICAL November 1996 SPECIFICATION Version 5.1.0 Source: ETSI TC-SMG Reference: TS/SMG-010278QR ICS: 33.020 Key words: Digital cellular telecommunications system, Global System for Mobile
More informationFinal draft ETSI ES V1.1.1 ( )
Final draft ES 202 060-2 V1.1.1 (2003-03) Standard Short Message Service (SMS) for fixed networks; Network Based Solution (NBS); Part 2: Architecture and functional entities 2 Final draft ES 202 060-2
More information